/// <summary>Snippet for Insert</summary> public void Insert() { // Snippet: Insert(string, Firewall, CallSettings) // Create client FirewallsClient firewallsClient = FirewallsClient.Create(); // Initialize request argument(s) string project = ""; Firewall firewallResource = new Firewall(); // Make the request lro::Operation <Operation, Operation> response = firewallsClient.Insert(project, firewallResource); // Poll until the returned long-running operation is complete lro::Operation <Operation, Operation> completedResponse = response.PollUntilCompleted(); // Retrieve the operation result Operation result = completedResponse.Result; // Or get the name of the operation string operationName = response.Name; // This name can be stored, then the long-running operation retrieved later by name lro::Operation <Operation, Operation> retrievedResponse = firewallsClient.PollOnceInsert(operationName); // Check if the retrieved long-running operation has completed if (retrievedResponse.IsCompleted) { // If it has completed, then access the result Operation retrievedResult = retrievedResponse.Result; } // End snippet }
public HttpClient(Firewall firewall, IListener <RequestReceivedEventArgs> listener, Logger <HttpRequestEntry> logger) { this.firewall = firewall; this.listener = listener; this.listener.OnNewRequestReceived += Listener_OnNewConnectionReceived; this.logger = logger; }
private void addbtn_Click(object sender, EventArgs e) { try{ if (switchButton1.Value) { Firewall.Add("AllowAll", filetxt.Text); LabelItem lb = new LabelItem(); lb.Text = filetxt.Text + "|AllowAll"; lb.Name = "lb" + itemPanel1.Items.Count.ToString(); itemPanel1.Items.Add(lb); } else { Firewall.Add("DenyAll", filetxt.Text); LabelItem lb = new LabelItem(); lb.Text = filetxt.Text + "|DenyAll"; lb.Name = "lb" + itemPanel1.Items.Count.ToString(); itemPanel1.Items.Add(lb); } } catch (Exception ex) { AntiCrash.LogException(ex); } finally { } }
void Awake() { if (Firewall.DoesAppRestrictionExist() && autoUpdateFirewallRule) { Firewall.UpdateAppRule(); } }
public Firewall(Firewall f) { Depth = f.Depth; Range = f.Range; Position = f.Position; Direction = f.Direction; }
public void CollectStatWhenGiven2ip2icmp1tcp5udpPacketsThenCountOfPacketsIsRight() { NetworkPacket[] packets = new NetworkPacket[10]; packets[0] = new IPPacket(); packets[1] = new IPPacket(); packets[2] = new ICMPPacket(); packets[3] = new ICMPPacket(); packets[4] = new TCPPacket(); packets[5] = new UDPPacket(); packets[6] = new UDPPacket(); packets[7] = new UDPPacket(); packets[8] = new UDPPacket(); packets[9] = new UDPPacket(); Firewall fw = new Firewall(new FilterMock(), new DistributorMock()); CollectStatCommand clltStat = new CollectStatCommand(); Assert.AreEqual(fw.Statistics["ip"], 0); Assert.AreEqual(fw.Statistics["icmp"], 0); Assert.AreEqual(fw.Statistics["tcp"], 0); Assert.AreEqual(fw.Statistics["udp"], 0); Assert.AreEqual(fw.Statistics["total"], 0); foreach (var packet in packets) { clltStat.DoWithPacket(fw, packet); } Assert.AreEqual(fw.Statistics["ip"], 2); Assert.AreEqual(fw.Statistics["icmp"], 2); Assert.AreEqual(fw.Statistics["tcp"], 1); Assert.AreEqual(fw.Statistics["udp"], 5); Assert.AreEqual(fw.Statistics["total"], 10); }
/// <summary>Snippet for UpdateAsync</summary> public async Task UpdateAsync() { // Snippet: UpdateAsync(string, string, Firewall, CallSettings) // Additional: UpdateAsync(string, string, Firewall, CancellationToken) // Create client FirewallsClient firewallsClient = await FirewallsClient.CreateAsync(); // Initialize request argument(s) string project = ""; string firewall = ""; Firewall firewallResource = new Firewall(); // Make the request lro::Operation <Operation, Operation> response = await firewallsClient.UpdateAsync(project, firewall, firewallResource); // Poll until the returned long-running operation is complete lro::Operation <Operation, Operation> completedResponse = await response.PollUntilCompletedAsync(); // Retrieve the operation result Operation result = completedResponse.Result; // Or get the name of the operation string operationName = response.Name; // This name can be stored, then the long-running operation retrieved later by name lro::Operation <Operation, Operation> retrievedResponse = await firewallsClient.PollOnceUpdateAsync(operationName); // Check if the retrieved long-running operation has completed if (retrievedResponse.IsCompleted) { // If it has completed, then access the result Operation retrievedResult = retrievedResponse.Result; } // End snippet }
private Firewall Firewall(ResourceGroup resourceGroup, Subnet snet, int vnetRangePrefix) { var publicIp = new PublicIp($"ip-fw-{DeploymentName}{vnetRangePrefix / 2 + 1}", new PublicIpArgs { ResourceGroupName = resourceGroup.Name, Location = resourceGroup.Location, Sku = "Standard", AllocationMethod = "Static" }); var firewall = new Firewall($"fw-{DeploymentName}{vnetRangePrefix / 2 + 1}", new FirewallArgs { ResourceGroupName = resourceGroup.Name, Location = resourceGroup.Location, IpConfigurations = { new FirewallIpConfigurationArgs { Name = $"fw-config-{DeploymentName}{vnetRangePrefix / 2 + 1}", SubnetId = snet.Id, PublicIpAddressId = publicIp.Id } } }); return(firewall); }
private void SpawnFirewall() { Firewall newFirewall = _firewalls[Random.Range(0, _firewalls.Length)]; Vector3 position; if (_previousFirewall == null) { position = new Vector3(Mathf.Floor(_player.position.x + Random.Range(minimunDistance, maximumDistance)), newFirewall.Size.y - 1.42f, 2); } else { position = new Vector3(Mathf.Floor(_previousFirewall.Position.x + _previousFirewall.Size.x + Random.Range(minimunDistance, maximumDistance)), newFirewall.Size.y - 1.42f, 2); } _previousFirewall = Instantiate(newFirewall, position, Quaternion.identity); _previousFirewall.transform.SetParent(transform); _trigger = _previousFirewall.Position.x; _firewallCounter++; if (_firewallCounter > 2) { _firewallCounter = 2; GameObject.FindWithTag("FirewallSpawner").transform.GetChild(0).GetComponent <Firewall>().Remove(); } }
public void TestDestroyFirewallDryrun() { var firewall = new Firewall("my http firewall", new FirewallRule( IpType.V4, Protocol.TCP, "8080", "192.0.0.1", 20) ); using var requests = new MockVultrRequests( new HttpHandler( "/firewall/group_list", Resources.VultrFirewallGroupList), new HttpHandler( "/firewall/rule_list?FIREWALLGROUPID=1234abcd&direction=in&ip_type=v4", @" { ""1"": { ""rulenumber"": 1, ""action"": ""accept"", ""protocol"": ""tcp"", ""port"": ""8080"", ""subnet"": ""192.0.0.1"", ""subnet_size"": 20, ""source"": """", ""notes"": """" } }"), new HttpHandler( "/firewall/rule_list?FIREWALLGROUPID=1234abcd&direction=in&ip_type=v6", "{}")); new VultrFirewallDestroyer(requests.Client).Destroy(firewall, true); requests.AssertAllCalledOnce(); }
public override void Execute(CommandEventArgs e, object obj) { Mobile from = e.Mobile; Mobile targ = (Mobile)obj; NetState state = targ.NetState; if (state != null) { CommandLogging.WriteLine(from, "{0} {1} firewalling {2}", from.AccessLevel, CommandLogging.Format(from), CommandLogging.Format(targ)); try { Firewall.Add(state.Address); AddResponse("They have been firewalled."); } catch (Exception ex) { LogFailure(ex.Message); } } else { LogFailure("They are not online."); } }
/// <summary> /// Creates a firewall rule in the specified project using the data included in the request. /// Documentation https://developers.google.com/compute/beta/reference/firewalls/insert /// Generation Note: This does not always build corectly. Google needs to standardise things I need to figuer out which ones are wrong. /// </summary> /// <param name="service">Authenticated compute service.</param> /// <param name="project">Project ID for this request.</param> /// <param name="body">A valid compute beta body.</param> /// <returns>OperationResponse</returns> public static Operation Insert(computeService service, string project, Firewall body) { try { // Initial validation. if (service == null) { throw new ArgumentNullException("service"); } if (body == null) { throw new ArgumentNullException("body"); } if (project == null) { throw new ArgumentNullException(project); } // Make the request. return(service.Firewalls.Insert(body, project).Execute()); } catch (Exception ex) { throw new Exception("Request Firewalls.Insert failed.", ex); } }
public void AddRuleToFirewall() { var firewall = new Firewall("my http firewall", new FirewallRule( IpType.V4, Protocol.TCP, "8080", "192.0.0.1", 20), new FirewallRule( IpType.V4, Protocol.TCP, "80", "cloudflare") ); using var requests = new MockVultrRequests( new HttpHandler( "/firewall/group_list", Resources.VultrFirewallGroupList), new HttpHandler( "/firewall/rule_list?FIREWALLGROUPID=1234abcd&direction=in&ip_type=v4", "{}"), new HttpHandler( "/firewall/rule_list?FIREWALLGROUPID=1234abcd&direction=in&ip_type=v6", "{}"), new HttpHandler( "/firewall/rule_create", new ValidateRequestHandler( "FIREWALLGROUPID=1234abcd&direction=in&ip_type=v4&" + "protocol=tcp&subnet=192.0.0.1&subnet_size=20&port=8080", "{\"rulenumber\": 2}"), new ValidateRequestHandler( "FIREWALLGROUPID=1234abcd&direction=in&ip_type=v4&" + "protocol=tcp&subnet=0.0.0.0&subnet_size=0&port=80&" + "source=cloudflare", "{\"rulenumber\": 3}"))); new VultrFirewallProvisioner(requests.Client).Provision(firewall); requests.AssertAllCalledOnce(); }
/// <summary> /// Applies firewall rules /// </summary> private static int ApplyRules(IPVersion Version) { Log("Applying firewall Rules..."); try { var FWRanges = Cache.SelectedRanges .Select(m => new RangeSet() { Direction = m.Direction, Ranges = Cache .GetAddresses(m) .Select(n => new CIDR(n, true)) .Where(n => Version.HasFlag(n.Type)) .ToArray() }) .Where(m => m.Ranges.Length > 0) .ToArray(); Debug("Clearing existing firewall rules..."); Debug("Removed {0} rules...", Firewall.ClearRules()); Debug("Adding new rules..."); Firewall.BlockRanges(FWRanges); Log("Blocked {0} ranges in {1} rules", FWRanges.SelectMany(m => m.Ranges).Count(), FWRanges.Length); } catch (Exception ex) { Log("Error: {0}", ex.Message); return(ERR.RULE_ERROR); } return(ERR.SUCCESS); }
/// <summary> /// Creates a firewall rule in the specified project using the data included in the request. /// Documentation https://developers.google.com/compute/beta/reference/firewalls/insert /// Generation Note: This does not always build corectly. Google needs to standardise things I need to figuer out which ones are wrong. /// </summary> /// <param name="service">Authenticated Compute service.</param> /// <param name="project">Project ID for this request.</param> /// <param name="body">A valid Compute beta body.</param> /// <param name="optional">Optional paramaters.</param> /// <returns>OperationResponse</returns> public static Operation Insert(ComputeService service, string project, Firewall body, FirewallsInsertOptionalParms optional = null) { try { // Initial validation. if (service == null) { throw new ArgumentNullException("service"); } if (body == null) { throw new ArgumentNullException("body"); } if (project == null) { throw new ArgumentNullException(project); } // Building the initial request. var request = service.Firewalls.Insert(body, project); // Applying optional parameters to the request. request = (FirewallsResource.InsertRequest)SampleHelpers.ApplyOptionalParms(request, optional); // Requesting data. return(request.Execute()); } catch (Exception ex) { throw new Exception("Request Firewalls.Insert failed.", ex); } }
public void TestFirewallEntry(string entry, Type entryType, string ipToMatch) { var firewallEntry = Firewall.ToFirewallEntry(entry); Assert.IsType(entryType, firewallEntry); Assert.True(firewallEntry.IsBlocked(IPAddress.Parse(ipToMatch))); }
private void BuildFirewall() { var firewallIpConfig = new FirewallIpConfigurationArgs { SubnetId = _Subnets["AzureFirewallSubnet"].Id, Name = "Foo", PublicIpAddressId = new PublicIp("firewallPip2", new PublicIpArgs { ResourceGroupName = _ResourceGroup.Name, Location = _ResourceGroup.Location, Sku = "Standard", Name = "firewallPip2", AllocationMethod = "Static", IpVersion = "IPv4" }).Id }; var fw = new Firewall("snowman2", new FirewallArgs { Name = "snowman2", ResourceGroupName = _ResourceGroup.Name, Location = _ResourceGroup.Location, ThreatIntelMode = "Off", IpConfigurations = new List <FirewallIpConfigurationArgs> { firewallIpConfig } }); }
public Device makeDevice(DeviceType dt) { Device d = new Device(); DeviceType dtype = DeviceType.WorkStation; switch (dt) { case DeviceType.WorkStation: d = new WorkStation(); break; case DeviceType.Printer: d = new Printer(); break; case DeviceType.Router: d = new Router(); break; case DeviceType.Switch: d = new Switch(); break; case DeviceType.Firewall: d = new Firewall(); break; case DeviceType.Bridge: d = new Bridge(); break; Default :; break; } return(d); }
public bool CheckSeed(byte[] decryptedData, bool isTheFirstPacket) { int hashReceive = (int)BitConverter.ToUInt16(decryptedData, 2); if (hashReceive == GetNextSessionSeed()) { return(true); } if (_player != null) { SaveLog.warning("[Seed] Seed invalida recebida após login. [Recebido: " + hashReceive + "; Esperava-se: " + NextSessionSeed + "] [Id: " + _player.player_id + "; Login: "******"; TotalPks: " + CountReceivedpackets + "] - " + GetIPAddress()); Printf.warning("[Invalid Seed] Client valido enviou seed invalida [pId:" + _player.player_id + "; Login: "******"] "); } else { SaveLog.warning("[Seed] Recebido: " + hashReceive + "; Esperava-se: " + NextSessionSeed + " - " + GetIPAddress() + ""); Printf.warning("[Invalid Seed] Receive: " + hashReceive + " - " + GetIPAddress()); } Firewall.sendBlock(GetIPAddress(), "[Auth] Seed invalida", 1); Close(true); if (isTheFirstPacket) { new Thread(read).Start(); } return(false); }
private void Stack() { var vnetRangePrefix = 1; VirtualNetwork[] exNetworks = new VirtualNetwork[locations.Count()]; Subnet[] exSubnets = new Subnet[locations.Count()]; Output <string>[] ipAddresses = new Output <string> [locations.Count()]; Firewall[] firewalls = new Firewall[locations.Count()]; var commonResourceGroup = ResourceGroup($"rg-{DeploymentName}-common-eastus2", "eastus2"); var privateDns = PrivateDns(commonResourceGroup.Name); var privateReverseDns = PrivateReverseDns(commonResourceGroup.Name); var rabbitCookie = RabbitCookie(); foreach (string location in locations) { var resourceGroup = ResourceGroup($"rg-{DeploymentName}-{location}", location); var inVNet = VNet(resourceGroup, vnetRangePrefix, false); var inSNet = InSNet(resourceGroup, vnetRangePrefix, inVNet); var networkProfile = NetworkProfile(resourceGroup, vnetRangePrefix, inSNet); var exVNet = VNet(resourceGroup, vnetRangePrefix, true); var exSNet = ExSNet(resourceGroup, vnetRangePrefix, exVNet); var firewall = Firewall(resourceGroup, exSNet, vnetRangePrefix); var storage = Storage(resourceGroup, vnetRangePrefix); var container = Container(resourceGroup, storage, networkProfile.Id, vnetRangePrefix, rabbitCookie, new [] { firewall }); exNetworks[vnetRangePrefix / 2] = exVNet; exSubnets[vnetRangePrefix / 2] = exSNet; ipAddresses[vnetRangePrefix / 2] = container.IpAddress; firewalls[vnetRangePrefix / 2] = firewall; RegionPeering(resourceGroup.Name, inVNet, exVNet, vnetRangePrefix); RegionRouteTable(resourceGroup, inSNet, vnetRangePrefix, firewall); ZoneLink(commonResourceGroup.Name, privateDns, inVNet.Id, vnetRangePrefix, false); ZoneLink(commonResourceGroup.Name, privateReverseDns, inVNet.Id, vnetRangePrefix, true); ReverseDnsRecord(commonResourceGroup.Name, privateReverseDns, container.IpAddress, vnetRangePrefix); vnetRangePrefix += 2; } GlobalPeering(exNetworks); GlobalRoutes(exNetworks, exSubnets, firewalls); var forwardingRules = IpForwarding(ipAddresses, firewalls); var record = DiscoveryDnsRecord(commonResourceGroup.Name, privateDns, ipAddresses); var dnsDependencies = forwardingRules .Cast <Resource>() .Concat(new [] { record }) .ToArray(); vnetRangePrefix = 1; foreach (Output <string> ipAddress in ipAddresses) { DnsRecord(commonResourceGroup.Name, privateDns, ipAddress, vnetRangePrefix, dnsDependencies); vnetRangePrefix += 2; } Cookie = rabbitCookie.Result; }
public Message ReplyTo(Message s, MessageEvent e) { try { string raw_text = ""; foreach (var i in s.data) { if (i.type == "text") { raw_text += i.data["text"]; } } if (Firewall.waf(e.GetEndpoint(), raw_text)) { return(Reply(raw_text)); } else { cqhttp.Cyan.Utils.Logger.GetLogger("AutoReply").Info( $"{e.GetEndpoint ()} triggered firewall" ); } } catch (KeyNotFoundException) { } return(new Message()); }
public override void Run() { Console.WriteLine("Day 13"); var input = GetInput(); Console.WriteLine("Part 2"); var firewall = Firewall.Create(input); firewall.Run(); Console.WriteLine($"Severity: {firewall.Severity}"); Console.WriteLine("Part 2"); var delay = 0; while (true) { firewall = Firewall.Create(input); firewall.Run(delay, true); if (!firewall.WasCaught) { break; } delay++; } Console.WriteLine($"Delay: {delay}"); }
static void Main(string[] args) { var firewall = new Firewall(input); Packet packet = null; firewall.FinishedPacket += (sender, p) => { if (p == null) { return; } packet = p; Console.WriteLine($"packet id {p.Id}: {p.RiskScore}, {p.Hit}"); }; firewall.InjectPacket(new Packet() { Id = 0 }); //int limiter = 10; int packetCount = 0; while (packet == null || packet.RiskScore > 0 || packet.Hit > 0) { firewall.Tick(); firewall.InjectPacket(new Packet() { Id = ++packetCount }); } Console.Read(); }
public int GetDelayForNoAlarms(Firewall firewall) { int delay = 0; bool safe = false; while (!safe) { bool earlyBreak = false; for (int i = 0; i < firewall.Depth(); i++) { if (firewall.AlarmWillBeTriggered(i, i + delay)) { // This delay is no good, so increase the delay and try again. delay++; earlyBreak = true; break; } } // If at no point we terminated the loop early, then every layer will // be safe as we travel through, so we've found the necessary delay. if (!earlyBreak) { safe = true; } } return(delay); }
public static void Stop() { try { if (SettingsManager.Firewall) { Firewall.Stop(); } if (SettingsManager.NIDS) { NetworkMonitor.Stop(); } if (SettingsManager.SystemMonitor) { FileSystemMonitor.Stop(); } if (SettingsManager.WebAgent) { WebMonitor.Stop(); } Protected = false; AntivirusState.SetProtection(false); } catch (Exception ex) { AntiCrash.LogException(ex); } finally { } }
void Update() { if (Core.getState() != this.lastState) { this.lastState = Core.getState(); Firewall.downgradeState(); } }
public ActionResult DeleteConfirmed(int id) { Firewall firewall = db.Firewalls.Find(id); db.Firewalls.Remove(firewall); db.SaveChanges(); return(RedirectToAction("Index")); }
public ActionResult Create(int Customerid) { Firewall f = new Firewall(); f.CustomerId = Customerid; return(View(f)); }
public void SetFirewall(Firewall firewall) { this.firewall = firewall; firewall.OnUpdateDifficulty += UpdateColor; firewallUIs = firewallUIs ?? new Dictionary <Firewall, FirewallUI>(); firewallUIs.Add(firewall, this); UpdateColor(); }
public ActionResult Edit(int id) { Firewall f = dbf.Read(id); f.CustomerId = f.Customer.Id; return(View(f)); }
public void GetRequestObject() { moq::Mock <Firewalls.FirewallsClient> mockGrpcClient = new moq::Mock <Firewalls.FirewallsClient>(moq::MockBehavior.Strict); mockGrpcClient.Setup(x => x.CreateOperationsClientForGlobalOperations()).Returns(new moq::Mock <lro::Operations.OperationsClient>().Object); GetFirewallRequest request = new GetFirewallRequest { Project = "projectaa6ff846", Firewall = "firewall1a37e536", }; Firewall expectedResponse = new Firewall { Id = 11672635353343658936UL, Kind = "kindf7aa39d9", Name = "name1c9368b0", CreationTimestamp = "creation_timestamp235e59a1", TargetTags = { "target_tags29e39aea", }, SourceServiceAccounts = { "source_service_accounts462c1c37", }, Direction = "direction7bc372ef", Allowed = { new Allowed(), }, SourceRanges = { "source_ranges5dbeae62", }, Network = "networkd22ce091", Disabled = false, Denied = { new Denied(), }, DestinationRanges = { "destination_rangesf67f2379", }, LogConfig = new FirewallLogConfig(), Description = "description2cf9da67", Priority = 1546225849, SourceTags = { "source_tags7a2648e1", }, SelfLink = "self_link7e87f12d", TargetServiceAccounts = { "target_service_accounts61bf1663", }, }; mockGrpcClient.Setup(x => x.Get(request, moq::It.IsAny <grpccore::CallOptions>())).Returns(expectedResponse); FirewallsClient client = new FirewallsClientImpl(mockGrpcClient.Object, null); Firewall response = client.Get(request); xunit::Assert.Same(expectedResponse, response); mockGrpcClient.VerifyAll(); }
void GivenInitializeFirewall() { fw = new Firewall(new FilterMock(), new DistributorMock()); }
/// <summary> /// Create the firewall rule. /// </summary> protected override void EndProcessing() { var firewall = new Firewall { Name = Name, Allowed = _allAllowed, Description = Description, Network = Network, SourceRanges = SourceRange, SourceTags = SourceTag, TargetTags = TargetTag }; InsertRequest request = Service.Firewalls.Insert(firewall, Project); WaitForGlobalOperation(Project, request.Execute()); WriteObject(Service.Firewalls.Get(Project, Name).Execute()); base.EndProcessing(); }
public void SetUp() { fw = new Firewall(new FilterMock(), new DistributorMock()); srcIP = new NetworkAddress("192.168.0.1"); dstIP = new NetworkAddress("1.0.0.1"); }